Search alternatives:
dose optimization » based optimization (Expand Search), model optimization (Expand Search), wolf optimization (Expand Search)
a optimization » ai optimization (Expand Search), _ optimization (Expand Search), b optimization (Expand Search)
class dose » class wise (Expand Search), last dose (Expand Search)
class a » class c (Expand Search), class _ (Expand Search), class i (Expand Search)
dose optimization » based optimization (Expand Search), model optimization (Expand Search), wolf optimization (Expand Search)
a optimization » ai optimization (Expand Search), _ optimization (Expand Search), b optimization (Expand Search)
class dose » class wise (Expand Search), last dose (Expand Search)
class a » class c (Expand Search), class _ (Expand Search), class i (Expand Search)
-
21
Parameter setting for CBOA and PSO.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
22
NSL-KDD dataset description.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
23
The architecture of LSTM cell.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
24
The architecture of ILSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
25
Parameter setting for LSTM.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
26
LITNET-2020 data splitting approach.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
27
Transformation of symbolic features in NSL-KDD.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
28
Programs to evaluate superoptimizer STOKE.
Published 2022“…<p>STOKE is one of the Superoptimizers which are programs that given a function and a set of instructions of a processor, traverse through a space of programs that compute a given function and try to find the optimal usually in terms of execution speed or size of the binary. …”
-
29
Algoritmo de clasificación de expresiones de odio por tipos en español (Algorithm for classifying hate expressions by type in Spanish)
Published 2024“…</li></ul><p dir="ltr"><b>File Structure</b></p><p dir="ltr">The code generates and saves:</p><ul><li>Weights of the trained model (.h5)</li><li>Configured tokenizer</li><li>Training history in CSV</li><li>Requirements file</li></ul><p dir="ltr"><b>Important Notes</b></p><ul><li>The model excludes category 2 during training</li><li>Implements transfer learning from a pre-trained model for binary hate detection</li><li>Includes early stopping callbacks to prevent overfitting</li><li>Uses class weighting to handle category imbalances</li></ul><p dir="ltr">The process of creating this algorithm is explained in the technical report located at: Blanco-Valencia, X., De Gregorio-Vicente, O., Ruiz Iniesta, A., & Said-Hung, E. (2025). …”
-
30
Silibinin solubilization: combined effect of co-solvency and inclusion complex formation
Published 2024“…The solubility in PBS-ethanol mixtures followed a log-linear model. SLB solubility in the presence of the ethanol co-solvent and HP-β-CD complexing agent was optimized by adopting a genetic algorithm suggesting the phosphate buffer saline solution supplemented by 6%v/v ethanol and 8 mM HP-β-CD as an optimized medium. …”
-
31
Image processing workflow.
Published 2020“…<p>Raw fluorescent microscope images (a) were processed with a binary segmentation algorithm, and clusters of bacterial cells were manually annotated. …”
-
32
-
33
-
34
Processed dataset to train and test the WGAN-GP_IMOA_DA_Ensemble model
Published 2025“…This framework integrates a novel biologically inspired optimization algorithm, the Indian Millipede Optimization Algorithm (IMOA), for effective feature selection. …”
-
35
Data_Sheet_1_Multiclass Classification Based on Combined Motor Imageries.pdf
Published 2020“…The proposed multilabel approaches convert the original 8-class problem into a set of three binary problems to facilitate the use of the CSP algorithm. …”
-
36
Variable Selection with Multiply-Imputed Datasets: Choosing Between Stacked and Grouped Methods
Published 2022“…Building on existing work, we (i) derive and implement efficient cyclic coordinate descent and majorization-minimization optimization algorithms for continuous and binary outcome data, (ii) incorporate adaptive shrinkage penalties, (iii) compare these methods through simulation, and (iv) develop an R package <i>miselect</i>. …”
-
37
Predictive Analysis of Mushroom Toxicity Based Exclusively on Their Natural Habitat.
Published 2025“…The consistent accuracy of 70.28% does not represent a flaw in the SVM. algorithm, but rather the predictive performance ceiling of the feature itself, whose simplicity and class overlap limit the model's discriminatory ability. …”
-
38
Supplementary Material 8
Published 2025“…<p dir="ltr">The Synthetic Minority Over-sampling Technique (SMOTE) is a machine learning approach to address class imbalance in datasets. …”
-
39
DataSheet_1_Exploring deep learning radiomics for classifying osteoporotic vertebral fractures in X-ray images.docx
Published 2024“…Logistic regression emerged as the optimal machine learning algorithm for both DLR models. …”
-
40
PathOlOgics_RBCs Python Scripts.zip
Published 2023“…</p><p dir="ltr">In terms of classification, a second algorithm was developed and employed to preliminary sort or group the individual cells (after excluding the overlapping cells manually) into different categories using five geometric measurements applied to the extracted contour from each binary image mask (see PathOlOgics_script_2; preliminary shape measurements). …”